23 Jul 2022

126

How We Collect and Preserve Evidence

Format: APA

Academic level: College

Paper type: Coursework

Words: 324

Pages: 1

Downloads: 0

Question 1 

The process begins by acquiring a search warrant which legally permits the investigators to physically seize the devices required and examine data contained on these devices (Casey, 2011). The next step involves searching and seizing the property in order to document the chain of custody. The chain of custody helps guarantee the integrity of the seized devices (National Institute of Justice (U.S.). (2010). The third step is to extract information from the device and hold the device to the legally required standards and integrity. The next step involves analyzing the results and verifying the accuracy and truthfulness by cross checking the obtained data. Finally, findings are developed which include all relevant information likely to be pertinent to the case at hand (Casey & Altheide, 2010). 

Question 2 

As a witness, the first thing I did was to take an oath swearing to the court that my testimony is nothing but the truth and to attest to the findings that were compiled from the recovered devices (National Institute of Justice (U.S.). (2010). Then, upon entering the witness stand, I would say that I was given a legal search warrant to look for the computer and other related electronic gadgets in the specified area. I would proceed with my testimony and explain my involvement at the scene of crime. As a forensic examiner and a key witness, it is my responsibility to be adequately prepared to respond to any questions about the investigation (Casey & Altheide, 2010). 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Question 3 

After seizing the computer evidence, I took the codes and pins of the individuals involved (National Institute of Justice (U.S.). (2010). Also, I gathered the cables, peripherals, manuals and the charges of these devices. Next, I had to establish that the emails I found on the devices’ hard drives existed on the seized gadgets at the time of the seizure. At this point, I used the chain of device to authenticate that the emails were present on the seized hard drives on the exact day the devices were seized (National Institute of Justice (U.S.). (2010). 

References 

Casey, E. (2011).  Digital evidence and computer crime: Forensic science, computers, and the internet . Amsterdam [etc.: Elsevier Academic Press. 

Casey, E., & Altheide, C. (2010).  Handbook of digital forensics and investigation . Amsterdam: Elsevier/Academic. 

National Institute of Justice (U.S.). (2010).  Electronic crime scene investigation: A guide for first responders . Darby, PA: Diane Publishing. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). How We Collect and Preserve Evidence.
https://studybounty.com/how-we-collect-and-preserve-evidence-coursework

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 165

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 182

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 252

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration